Where can I disable this within my Google account I use on Android?
Comment on In North Korea, your phone secretly takes screenshots every 5 minutes for government surveillance
stebator@lemmy.world 4 days ago
Hm, only screenshots? By the way, compared to what Google collects by default on every Android device, it’s really crazy. Have you seen the details of what is collected? It literally logs every touch, along with the description of button names and apps. You can turn this off in your Google account settings on Android, but nobody realizes what is collected or how to turn it off.
3migo@lemmy.world 4 days ago
pewgar_seemsimandroid@lemmy.blahaj.zone 4 days ago
thats the same thing im asking!
stebator@lemmy.world 3 days ago
replied above
stebator@lemmy.world 3 days ago
replied above
dev_null@lemmy.ml 4 days ago
Yes, Google’s code processes every touch, they wrote Android after all, so you are technically correct.
Is it all being sent somewhere from every Android device? Of course not, that’s ridiculous.
Zacryon@feddit.org 4 days ago
angry Snowden noises
taladar@sh.itjust.works 4 days ago
Storing individual button presses is ridiculous because that is much too low level when the apps also have much more high level information about your activities available. It is literally more useless than data you can acquire just as easily.
Zacryon@feddit.org 4 days ago
Probably. Although such low level interactions can also contribute. Depending on what someone wants to do or needs.
dev_null@lemmy.ml 4 days ago
Yes, I’m sure he’s angry people are diluting the invigilation he exposed by coming up with fake ones all the time
Zacryon@feddit.org 4 days ago
I don’t have the time right now to addeess all of this, but:
Device interactions can be used to identify users, predict and manipulate their behaviour, contribute to further identification measures etc…
Furthermore my point was that there are many reasons to be cautious about any type of data collection and processing. Saying a specific type would be ridiculous undermines the possible dangers stemming from this. Therefore I wouldn’t plainly discard these concerns.
Even if, in this context, the transmission is not widely noticed, this doesn’t pose a universal guarantee, especially if this can be turned on on demand via backdoors, trojans or whatever. Even worse if the transmission can be hidden. (Less likely for very proficient users with extremely tight network monitoring & control, but that’s rarely the case.)